Sciweavers

962 search results - page 112 / 193
» Input validation analysis and testing
Sort
View
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
15 years 9 months ago
Using functional independence conditions to optimize the performance of latency-insensitive systems
—In latency-insensitive design shell modules are used to encapsulate system components (pearls) in order to interface them with the given latency-insensitive protocol and dynamic...
Cheng-Hong Li, Luca P. Carloni
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
15 years 6 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
ICPR
2000
IEEE
16 years 3 months ago
Feature Relevance Learning with Query Shifting for Content-Based Image Retrieval
Probabilistic feature relevance learning (PFRL) is an effective technique for adaptively computing local feature relevance for content-based image retrieval. It however becomes le...
Douglas R. Heisterkamp, Jing Peng, H. K. Dai
123
Voted
CAIP
2009
Springer
15 years 9 months ago
A Methodology for Evaluating Illumination Artifact Removal for Corresponding Images
Robust stereo and optical flow disparity matching is essential for computer vision applications with varying illumination conditions. Most robust disparity matching algorithms rel...
Tobi Vaudrey, Andreas Wedel, Reinhard Klette
129
Voted
JCST
2010
189views more  JCST 2010»
14 years 9 months ago
Formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving
Probabilistic techniques are widely used in the analysis of algorithms to estimate the computational complexity of algorithms or a computational problem. Traditionally, such analys...
Osman Hasan, Sofiène Tahar